Access


SSH from a terminal is the only allowed protocol to log in - other insecure protocols (telnet, rlogin, rsh, ftp, etc.) are unsupported and disabled by default.


ssh -Y john@rama-login.research.mtu.edu


Replace john with your Michigan Tech ISO username; supply ISO password when prompted. Note that SSH, from off campus, will work only through VPN.

To use VPN

  1. Go to https://vpn.mtu.edu/.
  2. Log in with Michigan Tech ISO credentials.
  3. Click on get an MTU address (found under Network Access section).
  4. Follow subsequent instructions, if any.
  5. Wait until the browser (or a pop-up browser window) shows Status: connected.


Sharing login credentials (username and/or password) with other and/or unauthorized users is a violation of Acceptable Use of Information Technologies. Using this infrastructure in a manner that violates the above and/or other provisions described in the aforementioned policy will lead to immediate suspension of account to protect the integrity of the system and to curtail abuse. To the extent computer usage is believed to be a violation of federal, state, or local laws, Michigan Technological University will turn the matter over to the appropriate authorities.

Physical access to the computing infrastructure is by request only and all users will be accompanied by an authorized staff member of Information Technology Services.



Two Factor Authentication



This optional feature, Two Factor Authentication, expects that the user has a smart phone (Android or iPhone) with Google Authenticator app installed. The procedure is detailed below:



  1. Install the Google Authenticator (it's free) using an appropriate link below:

    Android | iPhone

  2. SSH into rama-login.research.mtu.edu.

  3. Run google-authenticator.


  4. Use Scan Barcode in Google Authenticator app to capture the QR code.



  5. Make a note of the secret key, verification code and emergency scratch codes in a secure place.

  6. Choose y as an answer for all subsequent questions.


  7. Inform Information Technology Services so that the administrators can complete the necessary steps.